|Publication number||US7205794 B2|
|Application number||US 10/182,418|
|Publication date||Apr 17, 2007|
|Filing date||Jan 26, 2001|
|Priority date||Jan 28, 2000|
|Also published as||DE60101147D1, DE60101147T2, EP1252561A2, EP1252561B1, US20030084336, WO2001055821A2, WO2001055821A3|
|Publication number||10182418, 182418, PCT/2001/311, PCT/GB/1/000311, PCT/GB/1/00311, PCT/GB/2001/000311, PCT/GB/2001/00311, PCT/GB1/000311, PCT/GB1/00311, PCT/GB1000311, PCT/GB100311, PCT/GB2001/000311, PCT/GB2001/00311, PCT/GB2001000311, PCT/GB200100311, US 7205794 B2, US 7205794B2, US-B2-7205794, US7205794 B2, US7205794B2|
|Inventors||Ross John Anderson, Simon William Moore|
|Original Assignee||Ross John Anderson, Simon William Moore|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (16), Non-Patent Citations (8), Referenced by (8), Classifications (29), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a 371 of PCT/GB01/00311 Jan. 26, 2001.
This invention is related to the protection of confidential electronic data against eaves-droppers who try to reconstruct it from the electromagnetic emissions on power wires.
Smartcards, and other electronic devices used for security purposes, are vulnerable to analysis of power consumption in order to extract secret data [4, 5, 12, 14]. This technique, known as power analysis, can reveal a lot of information about the work being done by the electronics, including the Hamming weights of signal transitions on the buses and the instructions being executed. If circuits consume power in relation to the data values being processed then the power signature contains secret data in an encoded form. Given the algorithm being computed by a microprocessor or other secure device, the eavesdropper can construct a set of input stimuli to obtain a corresponding set of power traces which can be used to extract the secret information .
A related threat to smartcard systems is direct physical attack. The card's packaging is removed and the signals on the bus, or elsewhere in the processor, are read out using microprobes . This step is typically used against some samples of the card to extract the card's software; once this has been done, an attack using power analysis can be devised which will work against other cards of the same type without the need to depackage them. A particularly grave threat is that such an attack might be implemented in a seemingly innocuous terminal, in which members of the public might insert smartcards issued by a bank or government in order to obtain some low cost service. For example, a criminal gang might set up a market stall and sell goods, but with the real intention of obtaining cardholders' private or secret keys and thus forging smartcards which would later be used to loot their accounts or impersonate them for welfare and other claims.
Another threat to smartcard systems is fault induction. Faults can be induced in a number of ways, such as by introducing transients (‘glitches’) on the power and clock lines [14, 1]. These may cause the processor to malfunction in a predictable and useful way. Another attack technique, used in the context of an invasive microprobing attack, is to use a laser to shoot away alarm circuitry, or protective circuitry such as access control matrices which only allow certain areas of memory to be accessed following the presentation of certain passwords . In order to ensure that the failure of a single circuit element (such as a wire or transistor) cannot cause secret data to be leaked, some manufacturers of defence electronic equipment use two-wire logic, that is, logic in which each state is carried on two wires with ‘01’ meaning ‘0’ and ‘10’ meaning ‘1’. To date, such circuits appear to have used clocked rather than self-timed logic. As well as measuring the current drawn by the secure device, an attacker can also measure the time taken for a cryptographic or other computation to execute . We will consider this to be a special case of power analysis.
Existing defensive technology includes randomised internal clock generators to deny precise timing information to an attacker , incorporating a number of oscillators and/or noise generators to provide masking signals, physical chip coatings to make probing more difficult, sensor grids in the top metal layer of the chip which may be broken during probing attacks and activate alarms , and mechanisms whereby a random input may be used to make a processor execute equivalent sequences of instruction cycles, or insert nulls (no-ops) into the instruction execution sequence [10.]
A secure device must therefore be protected in a number of ways. Noninvasive attacks based on power analysis must be made difficult, and to hinder attacks based on some combination of probing out the contents of a chip, inducing faults (whether by applied glitches or by invasive destructive methods such as laser shots), and power analysis, the circuit must also be highly resistant to electromagnetic transients while being able to propagate alarms quickly in the event of an attack being detected. This combination of robustness and fragility has been very hard to achieve with existing silicon technology.
According to the current invention there is provided a microprocessor with reduced data dependent power signature, resilience against single-element faults, and an efficient alarm mechanism to propagate alarms through the chip quickly and thus make algorithm extraction via probing more difficult. It also uses asynchronous circuitry which decouples the internal execution from the device external interface. The techniques in our invention apply without loss of generality to security processors which are not microprocessors, such as dedicated encryption chips and modules which contain more than one chip (e.g., separate processor, cryptographic chip and RAM in a single package).
Our invention is adapted from dual-rail encoded asynchronous logic because in this technology, the power consumed can be made substantially independent of the data being processed, and by the choice of suitable design rules, which should be clear to those skilled in the art, the design can be made resistant to single-transistor and single-wire faults. Furthermore, such circuits are already known to be highly resilient to variations in the applied power supply voltage. In our invention, alarms resulting from environmental sensors or from the activation of other protective mechanisms can be propagated rapidly through the chip using many independent paths.
We define ‘quad-coded data’ as follows. We use two wires to represent every logical bit. This is similar to dual-rail (sometimes called double-rail) encoded data  used in speed independent circuit design, except that we use the fourth state to propagate an alarm signal (see
two wire data encoding schemes
traditional dual-rail encoding
clear (or “undefined”)
A processor pipeline with a quad-coded data-path may be constructed using well known dual-rail pipelining techniques . Alarm signals can be inserted using an OR function of the data and with a sense signal from a sensor (see
Once an alarm signal has been injected into the data-path it obliterates the data in the pipeline since any dyadic function of a valid logic level (012 or 102) with an alarm signal (11 2) will result in an alarm signal.
Logical inversion (NOT) of quad-coded data requires no gates—the wires just have to be swapped. Thus, a quad-coded NOT function has no overhead. Further, inverting an alarm signal (11 2) outputs an alarm signal.
It is well known that logic functions AND, NAND, OR and NOR can all be constructed from one AND gate plus NOT functions using de Morgan's law. Since NOT functions propagate alarm signals, we just have to demonstrate that a quad-coded AND gate also propagates alarm signals. The circuit for a quad-coded AND gate is illustrated in
Functions of more than two inputs can be constructed from these two input functions, though more efficient versions which still propagate the alarm signal correctly are easy to define.
To ensure that alarm signals are propagated as quickly as possible, there are places in the chip where additional circuitry is used to detect the presence of an alarm (using an AND gate (5) in
As discussed in the previous section, quad-coded NOT functions are implemented by swapping wires; no gates are required and so no power is consumed. Other functions can be constructed from quad-coded AND gates + quad-NOT functions. The AND gate of
The most notable exception will be when data values affect the control flow. For example, when computing a digital signature the critical computation is often xy modulo n, where y is the secret value. As exponentiation is implemented using repeated squaring and doubling, depending on whether the bits in the binary expansion of y are zero or 1, an opponent who can tell the difference between squaring and doubling by studying the chip's power consumption can deduce the secret value y. However, given a processor of sufficient performance, this residual vulnerability can be dealt with using defensive programming techniques, such as computing both the squaring and the doubling operation at each step and copying only the desired one of the two results to the next stage of the computation. Self timed logic has the potential for substantially better performance than clocked logic in a smartcard environment, as the speed of the computation is limited only by the underlying silicon process rather than the externally supplied clock.
The quad-coded circuits and defensive programming technique described so far will reduce the data dependent power usage. However, data dependent timing behaviour may be visible. To counteract this effect, additional random delays are added to the data path and control path. This is possible because these circuits are speed independent. The effect is far more subtle than known clocked equivalents which slow the device by a whole clock period which is a predictable unit of time . Random delays in the data-path or the control-path may be inserted using a the circuit in
Finally, in order to support the use of software defensive measures which can further reduce the intelligibility of any residual data dependent power signal, our microprocessor has an additional instruction: set-random-carry. This supports the idea in  whereby a random choice is made between two equivalent but different sequences of instructions. The processor can jump to the two sequences using branch-carry-set and branch-carry-clear instructions. The implementation of the set-random-carry instruction is greatly facilitated by the use of quad-coded logic because a free running pseudo-random number generator based on a shift register (or without loss of generality and oscillator) produces pseudo-random bits with a timing independent of the processor instruction execution, and this bit stream is sampled when the set-random-carry instruction is executed.
The above references are incorporated herein by reference.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4439835||Jul 14, 1981||Mar 27, 1984||Rockwell International Corporation||Apparatus for and method of generation of ripple carry signals in conjunction with logical adding circuitry|
|US4513389||Nov 12, 1981||Apr 23, 1985||Ncr Corporation||ROM security circuit|
|US4539682||Apr 11, 1983||Sep 3, 1985||The United States Of America As Represented By The Secretary Of The Army||Method and apparatus for signaling on-line failure detection|
|US4783801||Dec 5, 1984||Nov 8, 1988||Gao Gesellschaft Fur Automation Und Organisation Mbh||Apparatus for protecting secret information|
|US4881199||Jan 14, 1988||Nov 14, 1989||Sgs-Thomson Microelectronics S.A.||Read circuit for reading the state of memory cells|
|US4932053||Nov 3, 1989||Jun 5, 1990||Sgs-Thomson Microelectronics, S.A.||Safety device against the unauthorized detection of protected data|
|US5083106 *||Feb 11, 1991||Jan 21, 1992||Detection Systems, Inc.||Intruder detection system with programmable countdown timer for self-supervision|
|US5208489 *||Dec 10, 1990||May 4, 1993||Texas Instruments Incorporated||Multiple compound domino logic circuit|
|US5404402||Dec 21, 1993||Apr 4, 1995||Gi Corporation||Clock frequency modulation for secure microprocessors|
|US5493240||Mar 1, 1995||Feb 20, 1996||International Business Machines Corporation||Static combinatorial logic circuits for reversible computation|
|US20040228190 *||Jun 15, 2004||Nov 18, 2004||Infineon Technologies Ag||Integrated circuit and method for operating the integrated circuit|
|US20050141295 *||Dec 8, 2004||Jun 30, 2005||Infineon Technologies Ag||Protection of chips against attacks|
|US20050270061 *||Jun 6, 2005||Dec 8, 2005||Infineon Technologies Ag||Configurable logic circuit|
|US20050273631 *||Jun 8, 2004||Dec 8, 2005||Hrl Laboratories, Llc||Cryptographic CPU architecture with random instruction masking to thwart differential power analysis|
|GB2333883A||Title not available|
|WO1999063696A1||Jun 3, 1999||Dec 9, 1999||Cryptography Research, Inc.||Using unpredictable information to minimize leakage from smartcards and other cryptosystems|
|1||I. David et al., "An Efficient Implementation of Boolean Functions as Self-Timed Circuits," IEEE Transactions on Computers, vol. 41, No. 1, pp. 2-11, 1992, no month.|
|2||O. Kömmerling et al., "Design Priniciples for Tamper-Resistant Smartcard Processors," USENIX Workshop on Smartcard Technology, Chicago, IL, USA, May 10-11, 1999.|
|3||P. Kocher et al., "Differential Power Analysis," Advances in Cryptology-Crypto 99, Proceedings Springer LNCS, 1999, no month.|
|4||P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Adv. in Cryptology-Crypto 96, Aug. 18-22, 1996, Proceedings, Springer LNCS v 1109, pp. 104-113.|
|5||R. Anderson et al., "Low Cost Attacks on Tamper Resistant Devices," in M. Lomas et al. (ed.): Security Protocols, 5<SUP>th </SUP>Intl. Workshop, Paris, France, Apr. 7-9, 1997, Proceedings, Springer LNCS v 1361, pp. 125-136, ISBN 3-540-64040-1.|
|6||R. Anderson et al., "Tamper Resistance-A Cautionary Note," The Sec. USENIX Workshop on Electronic Commerce, Oakland, CA, Nov. 18-21, 1996; Proceedings pp. 1-11, ISBN 1-880446-83-9.|
|7||S. Chari et al., "A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards," Sec. Ad. Encryption Standard Candidate Conf., Mar. 22-23, 1999, proceedings published by NIST, pp. 133-147.|
|8||T. Messerges et al., "Investigations of Power Analysis Attacks on Smartcards," Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151-161.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7500110 *||Dec 13, 2002||Mar 3, 2009||Nxp B.V.||Method and arrangement for increasing the security of circuits against unauthorized access|
|US8171330||May 22, 2009||May 1, 2012||Tiempo||Asynchronous circuit insensitive to delays with time delay insertion circuit|
|US20030154389 *||Dec 13, 2002||Aug 14, 2003||Peeters Adrianus Marinus Gerardus||Method and arrangement for increasing the security of circuits against unauthorized access|
|US20050055563 *||Jul 23, 2004||Mar 10, 2005||Wieland Fischer||Device and method for generating an operation code|
|US20090307516 *||May 22, 2009||Dec 10, 2009||Tiempo||Asynchronous circuit insensitive to delays with time delay insertion circuit|
|US20100067685 *||Aug 13, 2007||Mar 18, 2010||Yoshitaka Okita||Encryption device|
|US20120204056 *||Oct 24, 2011||Aug 9, 2012||Cedric Denis Robert Airaud||Power Signature Obfuscation|
|EP2131495A1||May 26, 2009||Dec 9, 2009||Tiempo||Asynchronous circuit not sensitive to delays with delay insertion circuit|
|U.S. Classification||326/104, 326/8, 712/E09.032, 712/E09.079|
|International Classification||G06F21/55, G06F7/00, H03K19/20, G06F9/32, H04L9/10, G09C1/00, H03K19/173, G06F9/30|
|Cooperative Classification||H04L2209/125, H04L2209/08, G06F9/3005, G06F9/30094, G06F9/30058, G06F2207/7266, H04L9/004, G09C1/00, H04L9/003, G06F21/558, G06F7/00|
|European Classification||G06F9/30B, G06F9/30A3, G06F9/30A3C, G06F21/55C2, G06F7/00, H04L9/06C|
|Nov 22, 2010||REMI||Maintenance fee reminder mailed|
|Apr 17, 2011||LAPS||Lapse for failure to pay maintenance fees|
|Jun 7, 2011||FP||Expired due to failure to pay maintenance fee|
Effective date: 20110417